Rapid7 Vulnerability & Exploit Database

Microsoft Windows: CVE-2019-0608: Microsoft Browser Spoofing Vulnerability

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Microsoft Windows: CVE-2019-0608: Microsoft Browser Spoofing Vulnerability

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
10/08/2019
Created
10/09/2019
Added
10/08/2019
Modified
09/06/2024

Description

A spoofing vulnerability exists when Microsoft Browsers does not properly parse HTTP content, aka 'Microsoft Browser Spoofing Vulnerability'. This CVE ID is unique from CVE-2019-1357.

Solution(s)

  • microsoft-windows-windows_10-1507-kb4520011
  • microsoft-windows-windows_10-1607-kb4519998
  • microsoft-windows-windows_10-1703-kb4520010
  • microsoft-windows-windows_10-1709-kb4520004
  • microsoft-windows-windows_10-1803-kb4520008
  • microsoft-windows-windows_10-1809-kb4519338
  • microsoft-windows-windows_10-1903-kb4517389
  • microsoft-windows-windows_server_2012-kb4519974
  • microsoft-windows-windows_server_2012_r2-kb4519974
  • microsoft-windows-windows_server_2016-1607-kb4519998
  • microsoft-windows-windows_server_2019-1809-kb4519338
  • msft-kb4517389-c417813c-d3db-4b44-83f8-60de59e73b91
  • msft-kb4519974-0044a86b-9ff7-4e99-bbe6-44263c2c38b3
  • msft-kb4519974-4675ef76-6151-4cfb-9d78-f2d7ec200a30
  • msft-kb4519974-71e3c671-6eab-420a-9703-fb55ee914e8d
  • msft-kb4519974-921d575f-c48d-41c9-82fd-d3d5df9f3adc
  • msft-kb4519974-9a3d55fd-a8bf-4efd-827a-82ebe9cbe23f
  • msft-kb4519974-9d7b38d5-cf83-4725-8ded-806e758e74a5
  • msft-kb4519974-a8c5f8c8-d0ee-4215-b88b-7067a65cfada
  • msft-kb4519974-a9ac4f32-9b3e-4988-a35f-1a1fecfc2051
  • msft-kb4519974-b8827576-e4ba-44aa-a63e-ec7992c2cc97
  • msft-kb4519974-e594ae26-cf40-44c1-8fd2-7c6d1ae2b5dc
  • msft-kb4519974-e5d664a3-03c5-4bc0-b6a3-d37d7c09efd5
  • msft-kb4519974-e964c71c-4f5e-4ba1-8d62-f28f0850c9f0
  • msft-kb4519974-f5a2187f-3861-4963-9c6f-d4727c4712e5

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;